Author: Zhang Nan
Publisher: Springer Publishing Company
ISSN: 1387-3326
Source: Information Systems Frontiers, Vol.13, Iss.3, 2011-07, pp. : 381-395
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
What Do We Know-and How Can We Find It?
By Dority Kim
The Charleston Advisor, Vol. 4, Iss. 4, 2003-04 ,pp. :
SourceOECD Science & Information Technology, Vol. 2006, Iss. 1, 2006-04 ,pp. :
Digital Creativity, Vol. 23, Iss. 1, 2012-03 ,pp. :
Malware Attacks: Why, When and How?
SourceOECD Science & Information Technology, Vol. 2009, Iss. 2, 2009-02 ,pp. :